1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
rewona [7]
3 years ago
10

To achieve the maximum confidentiality and integrity found in a completely secure information system would require that the syst

em not allow access (or availability) to anyone.
a. True
b. False
Computers and Technology
1 answer:
fgiga [73]3 years ago
5 0

Answer:

The answer is "Option a".

Explanation:

Privacy is a set of rules, which limiting access to the data, and integrity ensures impartiality, accuracy, and reliability is assured to ensure, which authorized persons can have secure access to the data.

The system needs no access for everyone to achieve its secrecy and integrity contained in a completely safe data system, that's why the given statement is "true".

You might be interested in
This exspansion slot essentially replaced PCI and AGP slots
MrRa [10]
PCI and AGP slots have been replaced with PCI-E slot (PCI-Express). There are different types of PCI-E buses:

PCI Express 1x (250 [500] * MB/s)
PCI Express 2x (500 [1000] * MB/s)
PCI Express 4x (1000 [2000] * MB/s)
PCI Express 8x (2000 [4000] * MB/s)
PCI Express 16x (4000 [8000] * MB/s)
<span>PCI Express 32x (8000 [16000] * MB/s)

I hope that's what you meant :)</span>
4 0
3 years ago
you're troubleshooting an ip addressing issue, and you issue a command to view the system's tcp/ip configuration. the command yo
Leviafan [203]

Based on the above, the operating systems the person is  working on is known to be called Linux.

<h3>What is Linux used for?</h3>

Linux is known to be a kind of an open-source Unix-like operating system that is known to be focused on the Linux kernel, which is said to be a kind of an operating system kernel that was said to have been first released on September 17, 1991.

This was released by a man called by Linus Torvalds. Linux is known to be packaged as a form of Linux distribution. It is said to be used as a Server OS made for web servers, it is also used for database servers, file servers, email servers and others.

Therefore, Based on the the given description above, the operating systems the person is  working on is known to be called Linux.

Learn more about Linux from

brainly.com/question/12853667
#SPJ1

You are troubleshooting an IP addressing issue, and so issue a command to view the TCP/IP configuration of the system. The command you use produces the following output:

fxp0: flags=8843&lt;UP, BROADCAST, RUNNING, SIMPLEX, MULTICAST&gt; mtu 1500

inet6 fe80: :2a0:83ff:fe30:57a%fxp0 prefixlen 64 scopeid 0x1

inet 192.168.1.235 netmask 0xfffffx00 broadcast 255.255.255..255

ether 00:a0:83:30:05:7a

media: Ethernet autoselect (100BaseTX &lt;full-duplex&gt;)

status: active

1o0: flags=8049&lt;UP, LOOPBACK, RUNNING, MULTICAST&gt; mtu 16384

inet6 : : 1prefixlen 128

inet6 fe90: : 1%1o0 prefixlen 64 scopeid 0x7

inet 127.0.0.1 netmask 0xff000000

Which of the following operating systems are you working on?

3 0
1 year ago
In 1-2 sentences, describe how to use the thesaurus in the Word Processor you have used.
jasenka [17]
Thesaurus is a tool use to find the synonym of the of a word.
Here's the way to use the thesaurus in the word processor.
=> highlight the word, then right-click, Navigate to synonyms and the words will  display.
3 0
3 years ago
Read 2 more answers
JAVVVAAAAAA HELPPPP EDHESIVE ​
Mekhanik [1.2K]

Answer:

Here's some really bad code that works:

public static double average(int a, int b, int c, int d, int e)

{

return (((double)a + b + c + d + e) / 5);

}

5 0
3 years ago
Question 5) What is a feature of podcasts?
steposvetlana [31]

Answer:

the answer is a.they rely on airwaves for broadcasting

Explanation:

i just took this test on brainly

6 0
3 years ago
Read 2 more answers
Other questions:
  • Select all examples of proper keyboarding technique.
    15·2 answers
  • Why was the personal computer an important invention?
    7·1 answer
  • What two units are used to measure the frequency and amplitude of a sound wave?
    10·1 answer
  • What are the two types of lighting?
    7·2 answers
  • Someone talk to me please........
    5·2 answers
  • You are asked to write a program that prompts the user for the size of two integer arrays, user input for the size must not exce
    13·1 answer
  • Two types of are desktop computers and notebook computer
    11·2 answers
  • Help brainleist giving exam
    15·1 answer
  • This code --&gt; plt.plot(x,y) is used to draw :
    8·1 answer
  • By definition, what is the process of reducing security exposure and tightening security controls?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!